Tuesday, 14 December 2010
Monday, 13 December 2010
criteria that affects a person's access to IT
Gender - males usually prefer using technology compared to females.
Geogrpahic location - more rural areas have worse connectivity compared with more busy, economised areas.
Disability - some disabilities do not allow you to use technology, we take this for granted
age - children somtimes to young to understand anything about the internet. young children and older adults are much less likely to have internet connections.
Geogrpahic location - more rural areas have worse connectivity compared with more busy, economised areas.
Disability - some disabilities do not allow you to use technology, we take this for granted
age - children somtimes to young to understand anything about the internet. young children and older adults are much less likely to have internet connections.
why does the digital divide exist?
because of the economic divide. people with higher income are able to afford the technology whereas people who are on lower incomes are not able to. as the cannot afford the technology the are left behind in terms of digital supremacy with wealthier nations pulling away from the rest.
boring stuff
Group | Members |
A | Top management and professionals |
B | Middle management |
C1 | Clerical workers |
C2 | Skilled manual workers |
D | Semi-skilled workers |
E | Manual workers |
The national statistics socio-economic classification analytic classes | |
1 | Higher managerial and professional occupations |
1.1 | Large employers and higher managerial occupations |
1.2 | Higher professional occupations |
2 | Lower managerial and professional occupation |
3 | Intermediate occupations |
4 | Small employers and own account workers |
5 | Lower supervisory and technical occupations |
6 | Semi-routine occupations |
7 | Routine occupations |
8 | Never worked and long-term unemployed |
Monday, 29 November 2010
Dubai Internet City
Dubai Internet City (DIC) provides a strategic and cost effective platform for ICT companies targeting emerging markets in a vast region extending from the Middle East to the Indian subcontinent, and from Africa to Central Asia.
Launched in the year 2000, DIC now features a dynamic international community of ICT companies including global giants like Microsoft, Cisco Systems, IBM, HP, Dell, Siemens, Sun Microsystems, Computer Associates, PeopleSoft and Sony Ericsson. Many small and medium businesses (SMBs) and promising entrepreneurial ventures are also part of the community. The cluster comprises companies from a variety of sectors - Software Development, Business Services, Web Based and e-Commerce, Consultancy, Sales and Marketing and Back Office.
DIC provides an environment that attracts all elements of the ICT value chain, and in addition, has developed several programmes that can be leveraged by the community to explore and expand channel development opportunities. Companies are privy to an advanced Metro Ethernet broadband infrastructure and a range of business-enabling services including government transactions. DIC also has the world’s largest commercial IP Telephony network.
DIC offers both 100 per cent tax exemption and 100 per cent business ownership.
Launched in the year 2000, DIC now features a dynamic international community of ICT companies including global giants like Microsoft, Cisco Systems, IBM, HP, Dell, Siemens, Sun Microsystems, Computer Associates, PeopleSoft and Sony Ericsson. Many small and medium businesses (SMBs) and promising entrepreneurial ventures are also part of the community. The cluster comprises companies from a variety of sectors - Software Development, Business Services, Web Based and e-Commerce, Consultancy, Sales and Marketing and Back Office.
DIC provides an environment that attracts all elements of the ICT value chain, and in addition, has developed several programmes that can be leveraged by the community to explore and expand channel development opportunities. Companies are privy to an advanced Metro Ethernet broadband infrastructure and a range of business-enabling services including government transactions. DIC also has the world’s largest commercial IP Telephony network.
DIC offers both 100 per cent tax exemption and 100 per cent business ownership.
Data Response
1) the countries resources were directed at helping the people live, providing food and trying to provide the right living conditions. the money gets used in these areas instead of computer based things, e.g. the purchasing of IT equipment and teaching of skills.
2) the most pressing need is that of internet to allow easier communication to other countries so they can discuss trade etc. it would help expand their infrastructure and help open up more IT based jobs around the country.
3) the projects ahve not been the most successful in the world. this is becuase the technology that was being introduced was vastly out dated so the gap between africa and toehr countries is still as wide as before.
4) they have failed as the projects are not their main interest at the moment. this is because nliving conditions and trying to provide food are bigger concerns for the country.
5) basic word processing, software skills, internet usage and communication.
6) Communication, data base skills and spreadsheet skills.
2) the most pressing need is that of internet to allow easier communication to other countries so they can discuss trade etc. it would help expand their infrastructure and help open up more IT based jobs around the country.
3) the projects ahve not been the most successful in the world. this is becuase the technology that was being introduced was vastly out dated so the gap between africa and toehr countries is still as wide as before.
4) they have failed as the projects are not their main interest at the moment. this is because nliving conditions and trying to provide food are bigger concerns for the country.
5) basic word processing, software skills, internet usage and communication.
6) Communication, data base skills and spreadsheet skills.
Friday, 26 November 2010
How great is the divide and is this changing.
page 43 and 44, make notes.
last para on 45, find current fugures
research to answer points at top of page 46
last para on 45, find current fugures
research to answer points at top of page 46
Thursday, 25 November 2010
Digital Divide
use and impact of ICT differs from ocuntry to country. for example, in 2005 it was estimated that less than 1.8% of people in North Africa used the internet, compared in North America.
Activity 1
no monies
cheaper to use man labour rather than buy mechanical equipment
Activity 1
no monies
cheaper to use man labour rather than buy mechanical equipment
Thursday, 11 November 2010
Task 2
description of how IT is affectign 5 different aspects of peoples lives, considering the benefits and drawbacks, drawn together to give a picture of life overall in the information age.
due, 10th December.
due, 10th December.
Tuesday, 2 November 2010
Legislations
Data Protection Act - set up to protect the privacy of individuals from organisations. Personal data - any data that relates to a living, identifiable individual.
Exemptions - National Security, Crime and Taxation and domestic purposes.
main aspects
1) personal data shall be processede fairly and lawfully
2) P.D shall be obtained only for one or more specified purposes.
3) P.D. shall be adequate, relevant and not excessive in relation to its intended purpose.
4) P.D. shall be accurate and kept up to date.
5) P.D. processed for any purpose shall not be kept for longer than necessary.
6) P.D. shall be processed in accordance with the rights if the data subject
7) Appropriate measure shall be taken to prevent unauthorised or unlawful processing of personal data and against accidental loss or damage.
8) personal data shall not be transferred outside of the EU unless that country ensures adequate level of protection.
Data Subject
to access data stored about them.
to prevent processing that is likely to cause damage or distress
to prevent processing for the purpose of direct marketing.
to request a manual decision if they object to an automated one.
to be compensated if damage or distress is suffered by contravention of the act.
to rectify, block or erase incorrect data.
Computer Misuse Act (1990)
protects data by companies from Hackers
four main provisions.
1) unauthorised access to computer material
2) unauthorised access with intent to commit or facilitate further offences
3) unauthorised acts with intent to impair operation of a computer
4) making, supplying or obtaining articles for use in computer misuse offences.
Problems include - accidental intrude and proof of responsibility.
Copyright, Designs and Patents Act (1988)
this act makes it illegal to steal or create unauthorised copies of software. also covers manuals, books, cds and music.
Protects the interests of people who have created, written, invented something.
Regulation of Investigatory Powers Act (2000)
nicknamed the "snoopers" charter introduced to address the concerns about the use and misuse of communication interception techniques.
the Act allows lawful interception.
the Act makes it a criminal offence to monitor communications without lawful authority.
Examples
in the interest of national security.
to prevent or detect crime.
to investigate or detect unauthorised use of telecommunication systems.
Freedom of Information Act (2000)
applies to all public authorities (including government, health service, schools and police)
allows anyone to make a request for information they think the authority might hold. (although a request does not mean you will recieve the information!)
does not override any other Act (you wouldnt be able to access data protected under the data protection act)
Health and Safety at Work (1974)
this act aims to protect workers from harm in the workplace. it ensures that the employers provide a safe working environment, well maintained machinery and safety equipment if required.
Health and Safety (Display Screen Equipment) Regulations 1992
a very specific regulation relating to the use of computers in the work place.
covers areas including correct lighting, adjustable chair to provide correct posture, regular tests and eye tests (paid for by employer)
Exemptions - National Security, Crime and Taxation and domestic purposes.
main aspects
1) personal data shall be processede fairly and lawfully
2) P.D shall be obtained only for one or more specified purposes.
3) P.D. shall be adequate, relevant and not excessive in relation to its intended purpose.
4) P.D. shall be accurate and kept up to date.
5) P.D. processed for any purpose shall not be kept for longer than necessary.
6) P.D. shall be processed in accordance with the rights if the data subject
7) Appropriate measure shall be taken to prevent unauthorised or unlawful processing of personal data and against accidental loss or damage.
8) personal data shall not be transferred outside of the EU unless that country ensures adequate level of protection.
Data Subject
to access data stored about them.
to prevent processing that is likely to cause damage or distress
to prevent processing for the purpose of direct marketing.
to request a manual decision if they object to an automated one.
to be compensated if damage or distress is suffered by contravention of the act.
to rectify, block or erase incorrect data.
Computer Misuse Act (1990)
protects data by companies from Hackers
four main provisions.
1) unauthorised access to computer material
2) unauthorised access with intent to commit or facilitate further offences
3) unauthorised acts with intent to impair operation of a computer
4) making, supplying or obtaining articles for use in computer misuse offences.
Problems include - accidental intrude and proof of responsibility.
Copyright, Designs and Patents Act (1988)
this act makes it illegal to steal or create unauthorised copies of software. also covers manuals, books, cds and music.
Protects the interests of people who have created, written, invented something.
Regulation of Investigatory Powers Act (2000)
nicknamed the "snoopers" charter introduced to address the concerns about the use and misuse of communication interception techniques.
the Act allows lawful interception.
the Act makes it a criminal offence to monitor communications without lawful authority.
Examples
in the interest of national security.
to prevent or detect crime.
to investigate or detect unauthorised use of telecommunication systems.
Freedom of Information Act (2000)
applies to all public authorities (including government, health service, schools and police)
allows anyone to make a request for information they think the authority might hold. (although a request does not mean you will recieve the information!)
does not override any other Act (you wouldnt be able to access data protected under the data protection act)
Health and Safety at Work (1974)
this act aims to protect workers from harm in the workplace. it ensures that the employers provide a safe working environment, well maintained machinery and safety equipment if required.
Health and Safety (Display Screen Equipment) Regulations 1992
a very specific regulation relating to the use of computers in the work place.
covers areas including correct lighting, adjustable chair to provide correct posture, regular tests and eye tests (paid for by employer)
Friday, 22 October 2010
Civil Rights
one particular topic ont echnologyu in civil rights is that of the compulsory ID cards. the main poroblem of the ID cards is that they can contain a lot of information which is in a database, many people feel that this is not good as people may not want certain amounts of information to be available to people they do not wish to be seen.
however the cards can be seen as a good as they can provide alot of information about people if they were in an accidenty, it could provide information like allergies to medication, their blood type etc.
overall i think ID cards are a good idea a the can provide useful information, however i do feel only certain information should be available.
however the cards can be seen as a good as they can provide alot of information about people if they were in an accidenty, it could provide information like allergies to medication, their blood type etc.
overall i think ID cards are a good idea a the can provide useful information, however i do feel only certain information should be available.
Crime and Crime Prevention
ICT is used to prevent crime by;
- processing crime report faster.
- communication between officers
- databases created to anaylse trends and predict patterns
- CCTV Video, finger printing etc.
- hacking bank account details and sort code.
Future TV
in the next 20 years i think that the tv experience will be one that we will nev er forget. i think that technology will be so far advanced that we will truly feel like we are part of the program or film we are watching. 3D will be old with 4D taking precidence, making you feel things as they happen.
Thursday, 21 October 2010
Shoppping online
Benefits
Lower prices because of reduced overheads
Convenience
Choice can easily compare a number of shops.
Drawbacks
Deluvery problems
Hidden costs postage, packaging, insurance
Returns
Security non receipt, not as described.
Banking
Benefits
convenience
saves time
better control of finances
Privacy
more info
save money
more services available
Drawbacks
Security, fraud. etc
Benefits
Lower prices because of reduced overheads
Convenience
Choice can easily compare a number of shops.
Drawbacks
Deluvery problems
Hidden costs postage, packaging, insurance
Returns
Security non receipt, not as described.
Banking
Benefits
convenience
saves time
better control of finances
Privacy
more info
save money
more services available
Drawbacks
Security, fraud. etc
Tuesday, 12 October 2010
Entertainemnt and Leisure
virtually every area of entertainment has been touched by technology, both in production and distribution, and still room for change. digital technologies enable more personal creativity and choice, even to point of overload. now simple and inexpensive to produce music,video,sound,radio etc.
ICT at Sawtry Community College
updated computers
laptops
smart boards
plasma tv
projectors
cameras
VLE - allows teachers to guide students at home by posting videos on site explaining how to do work.
laptops
smart boards
plasma tv
projectors
cameras
VLE - allows teachers to guide students at home by posting videos on site explaining how to do work.
Education,Education,Education
traditionally poeple wen to school from 4-18 and perhaps went onto higher education. having finito education a person expected to embark on career that would last lifetime. nowadays people can expect at least couple of careers. even with smae career, demands change as of new technologies and ways of working that poeple inevitably need to keep learning.
wired up is dream to have lecturers give lectures by video, for software to monitor and control totally individualised learning plans of their choosings and for high quality resources to be available.
VLE, virtual learning environment has potential for delivering some of the benefits of wired up education.
drawbacks:
some students plagarise from website,without quoting the source of their information.
easy to publish inaccurate, biased or incorrect material.
many info providers are finding means of charging for their information that had previously been free.
wired up is dream to have lecturers give lectures by video, for software to monitor and control totally individualised learning plans of their choosings and for high quality resources to be available.
VLE, virtual learning environment has potential for delivering some of the benefits of wired up education.
drawbacks:
some students plagarise from website,without quoting the source of their information.
easy to publish inaccurate, biased or incorrect material.
many info providers are finding means of charging for their information that had previously been free.
Monday, 11 October 2010
Flexible Working / Work Life Balance
ICT has made working life more productive and more efficient, and also allows individuals to take on more responsibility. It enables individuals to achieve more. ICT allows communication to be achieved more effectively. Certain technologies have been made which allows production to be quicker. Examples include EPOS which stands for Electronic Point of Sale, EPOS are computerised tills which allow orders and purchases to be put through quickly and efficiently. Shop assistants then use EFTPOS to complete the transaction, using EFTPOS as the source of payment.
ICT does not just help large companies but also smaller ones with a small work force. ICT makes it easier as managers can produce their own reports and create their own presentations.
Conference calling makes it easier to balance work and life time as you are able to communicate with more than one person at the same time. This saves time as otherwise you would have to call each recipient individually.
In some cases the use of ICT allows more freedom and self-reliance to employees, giving them more responsibility making them feel more important. Being able to use different forms of ICT in different places means that time can be used more efficiently, e.g. on a train, a phone and laptop can be used so as not to waste time whilst travelling.
There are some disadvantages to this though, some people cannot handle the extra pressure placed upon them, meaning that their working hours may be longer than normal, causing more stress than normal to the employee. Although it may seem beneficial that work can be completed over travel or at home, it may start to intrude on your social lives and may not allow you to get away from it.
Thursday, 7 October 2010
activity 1 page 21
PDA - could be used to store clients details (phone number, address etc)
GPS - could be used to find alternate routes and locate where he is when lost.
laptop - allows him to store all the product information on laptop whilst also easing the admin side of things, reducing amount of physical products.
Moibile Phone - allows fast and easy communicaiton with clients or colleagues.
Software - could be installed on laptop to allow databases of stock and invoices to be created.
internet - could be used to store product info on.
GPS - could be used to find alternate routes and locate where he is when lost.
laptop - allows him to store all the product information on laptop whilst also easing the admin side of things, reducing amount of physical products.
Moibile Phone - allows fast and easy communicaiton with clients or colleagues.
Software - could be installed on laptop to allow databases of stock and invoices to be created.
internet - could be used to store product info on.
Monday, 27 September 2010
assessment task
instant messenger
blogs
newsgroups
online gaming/banking
entertainment
video
e-commerce
music downloads
social network
on each page;
pictures, small, not wasting space
loads of info
buttons on each page that navigate to each page
spelling grammar correctimundo
references to any pictures, etc
description and evaluation of atleast 5 different types of online service, drawn together to give a scope of the current scope and limitations of the internet as a whole.
blogs
newsgroups
online gaming/banking
entertainment
video
e-commerce
music downloads
social network
on each page;
pictures, small, not wasting space
loads of info
buttons on each page that navigate to each page
spelling grammar correctimundo
references to any pictures, etc
description and evaluation of atleast 5 different types of online service, drawn together to give a scope of the current scope and limitations of the internet as a whole.
Friday, 24 September 2010
e-commerce
e-commerce
e-commerce consists of the buying and selling of products over electronic systems such as the Internet or other computer networks.
online stores- sellers set up web stores, which are specialised websites with payment processing interfaces.
Online banking - computerised systems which allow customers to access and manage their accounts musing an Internet connection.
education - many different educations services available, from national gir dot learning.
e-government - UK government set itself a target for developing online services. e.g. tax returns, vehicle registration, nhs direct.
e-government - applying for uni
business incorporations were processed online
land registrations
auditing community visited websites
various branches of government.
Archiving and business
archiving - store a back up of your data online
company that hosts the service will perform their own back up to ensure data isnt lost.
small cost involved.
business - many of services discussed can be used by businesses to improve their services.
email, conference calls etc can reduce time/cost of communication.
download and entertainment
download - software
music and video
books
entertainment - radio
games
e-commerce consists of the buying and selling of products over electronic systems such as the Internet or other computer networks.
online stores- sellers set up web stores, which are specialised websites with payment processing interfaces.
Online banking - computerised systems which allow customers to access and manage their accounts musing an Internet connection.
education - many different educations services available, from national gir dot learning.
e-government - UK government set itself a target for developing online services. e.g. tax returns, vehicle registration, nhs direct.
e-government - applying for uni
business incorporations were processed online
land registrations
auditing community visited websites
various branches of government.
Archiving and business
archiving - store a back up of your data online
company that hosts the service will perform their own back up to ensure data isnt lost.
small cost involved.
business - many of services discussed can be used by businesses to improve their services.
email, conference calls etc can reduce time/cost of communication.
download and entertainment
download - software
music and video
books
entertainment - radio
games
Thursday, 23 September 2010
chat, instant messaging and SMS
chat covers a range of scenarios across a range of different networks.
these including;
internet relay chat is an open protocol not controlled by any one provider.
web based chat is offered by ISPS like BT and Freeserve, Yahoo and MSN
website-based chat offered by anyone with a site, it can be used to solve problems.
Instant messaging allows you to interact with other users in real time, in the now. usually more private than chat rooms, allowing people to talk without other people seeign.
SMS
SMS originally created to utilise the inefficient times in mobile phone messages to send short bursts of text.
Bulletin Boards
been around since 1978
allows users to share info
some allow uploading/downloading of images.
often used FAQ/ help desk forums etc.
often allow access to some areas without joining, but require login and pasword for full access
some BBS charge members to join.
Newsgroups
part of "old" internet and not commonly used
newsgroup names consist of 2 parts, frist giving category, 2nd what newsgroupo about.
example;
alt - any conceivable topic
biz. - business, services etc
comp. - hardware. software
humanities - fine art, philosophy
misc. - employment, helath etc
news. - info bout usenet news
rec. - games, hobbies
sci. - applied science, social science
soc. - social issues, culture
talk. - current issues and debates.
these including;
internet relay chat is an open protocol not controlled by any one provider.
web based chat is offered by ISPS like BT and Freeserve, Yahoo and MSN
website-based chat offered by anyone with a site, it can be used to solve problems.
Instant messaging allows you to interact with other users in real time, in the now. usually more private than chat rooms, allowing people to talk without other people seeign.
SMS
SMS originally created to utilise the inefficient times in mobile phone messages to send short bursts of text.
Bulletin Boards
been around since 1978
allows users to share info
some allow uploading/downloading of images.
often used FAQ/ help desk forums etc.
often allow access to some areas without joining, but require login and pasword for full access
some BBS charge members to join.
Newsgroups
part of "old" internet and not commonly used
newsgroup names consist of 2 parts, frist giving category, 2nd what newsgroupo about.
example;
alt - any conceivable topic
biz. - business, services etc
comp. - hardware. software
humanities - fine art, philosophy
misc. - employment, helath etc
news. - info bout usenet news
rec. - games, hobbies
sci. - applied science, social science
soc. - social issues, culture
talk. - current issues and debates.
Email was invented in the early 1970’s as a text-based only type of communications unlike the vast array of communications e-mail is now (pictures and links etc.). The origin of e-mail was before the introduction of the internet.
The advantages of email originate from its simplicity, it’s easy to use, it's fast, provides a permanent record of the communications, is able to be both formal and informal. With attachments the email is able to be to deliver any message, whether it is text, pictures or files. It is able to be sent to anyone in any place at any time, making it a quicker and cheaper way than by telephone.
The disadvantages do however come from the advantages, as email is so simple it can be misused very easily. At a simple level, inappropriate messages, e.g. spam, can be used and at a higher level accounts can be hacked, Trojans or viruses sent and all details taken.
Simple mail transfer protocol is standard feature of email. SMTP is an internet standard across IPs. SMTP allows senders to communicate with the mail receiver by issuing commands and supplying necessary data.
POP3, post office protocol, is an application for email that allows local email clients to receive emails from a remote, private server. POP3 currently has several authentication methods to provide varied levels of security for the server.
Spam is unsolicited email, which contains commercial content. The emails are not wanted by the account user and first became a problem in the mid-1990’s. Now a days email accounts contain a spam box, which instantly puts all spam into, making sure you do not accidently open it and receive viruses etc.
A computer virus is a malicious program which infests your computer, making it unusable and easy to get information off of. Viruses can copy themselves and infect computers.
There are many devices that can now send and receive mail, computers still lead the way in this department but now phones and even computer consoles such as the PS3 are catching up with it. People in this generation are blessed with the large amount of different ways as to which you can communicate between people, and we as a generation should be very grateful.
Email was invented in the early 1970’s as a text-based only type of communications unlike the vast array of communications e-mail is now (pictures and links etc.). The origin of e-mail was before the introduction of the internet.
The advantages of email originate from its simplicity, it’s easy to use, it's fast, provides a permanent record of the communications, is able to be both formal and informal. With attachments the email is able to be to deliver any message, whether it is text, pictures or files. It is able to be sent to anyone in any place at any time, making it a quicker and cheaper way than by telephone.
The disadvantages do however come from the advantages, as email is so simple it can be misused very easily. At a simple level, inappropriate messages, e.g. spam, can be used and at a higher level accounts can be hacked, Trojans or viruses sent and all details taken.
Simple mail transfer protocol is standard feature of email. SMTP is an internet standard across IPs. SMTP allows senders to communicate with the mail receiver by issuing commands and supplying necessary data.
POP3, post office protocol, is an application for email that allows local email clients to receive emails from a remote, private server. POP3 currently has several authentication methods to provide varied levels of security for the server.
Spam is unsolicited email, which contains commercial content. The emails are not wanted by the account user and first became a problem in the mid-1990’s. Now a days email accounts contain a spam box, which instantly puts all spam into, making sure you do not accidently open it and receive viruses etc.
A computer virus is a malicious program which infests your computer, making it unusable and easy to get information off of. Viruses can copy themselves and infect computers.
There are many devices that can now send and receive mail, computers still lead the way in this department but now phones and even computer consoles such as the PS3 are catching up with it. People in this generation are blessed with the large amount of different ways as to which you can communicate between people, and we as a generation should be very grateful.
Tuesday, 14 September 2010
Other Blog Providers
journalfen.net |
jimdo.com |
insanejournal.com |
Hubpages.com |
freeflux.net |
free-conversant.com |
freeblogit.com |
faves.com |
Esnips.com |
edublogs.org |
easyjournal.com |
Docstoc.com |
diaryland.com |
clearblogs.com |
blurty.com |
bloxster.net |
blogwebsites.net |
blogtext.org |
blogstudio.com |
blogstream.com |
blogster.com |
blogsome.com |
blogskinny.com |
blogr.com |
blogono.com |
blogigo.com |
bloghorn.com |
bloghi.com |
blogger.com |
blogeasy.com |
blog.com |
blinkweb.com |
bigadda.com |
Articlerich.com |
360.yahoo.com |
20six.co.uk |
Notes on blog
Hstory of the BLOG:
blogs started around 1997
Peter Merholz coined phrase 97/98
free blogs started in 1999
over 5 mill blogs exsist
before facebook etc, people used blogs as their presence on internet.
used as online journal, for example to shair daily thoughts
Blog Features:
have many features to enable author to create something unique
manage posts
authorise comments before published
manage links
archive old material
change blog design
give visitor data etc
Monday, 13 September 2010
Start up and my useful link ;)
got this blog up and running, looks so much fun ;)
heres some useful links for myself :L
Theory work
http://www.good.is/post/Using-Technology-to-Prevent-Blackouts/
http://news.bbc.co.uk/1/hi/programmes/click_online/8408264.stm
http://computer.howstuffworks.com/question599.htm
http://i.imgur.com/o7EbF.gif
http://www.youtube.com/watch?v=gqwJ-xUPanM
http://news.bbc.co.uk/1/hi/technology/8444358.stm
http://www.thenewecologist.com/2010/01/the-most-exciting-developments-in-green-cell-phones/
http://news.bbc.co.uk/1/hi/technology/8451108.stm
http://news.bbc.co.uk/1/hi/programmes/click_online/8460997.stm
http://www.ted.com/talks/david_pogue_says_simplicity_sells.html
http://www.livescience.com/common/media/video/player.php?aid=33021
http://www.babelgum.com/3021436/good-internet-censorship.htm
coursework
(http://www.ocr.org.uk/qualifications/type/gce/ict_tec/ict/index.aspx) - OCR ICT Website
• http://www.techotopia.com...... Home of free online books IT books
• http://www.ms-access2007.com/tutorials/index.html...... Access tutorials - Beginner level
• http://databases.about.com/od/tutorials/Tutorials.htm... Access tutorials –Intermediate
• www.techonthenet.com.............. Access and Excel skills development – Beginner to Expert level
• http://www.thekjs.essex.sch.uk/yates/candy_floss.htm.......... Excel and Access ( Practice tasks)
• www.exceltips.com............... Microsoft Excel skills.
• http://www.teach-ict.com/videohome.htm....... Microsoft / Adobe tutorial – Beginner to Intermediate
• http://www.mrexcel.com/articles.shtml#Formulas........ Excel Tutorial – Beginner to Expert tasks
• www.teach-ict.net/software/dreamweaver/dreamweaver.htm.... Dreamweaver basic
heres some useful links for myself :L
Theory work
http://www.good.is/post/Using-Technology-to-Prevent-Blackouts/
http://news.bbc.co.uk/1/hi/programmes/click_online/8408264.stm
http://computer.howstuffworks.com/question599.htm
http://i.imgur.com/o7EbF.gif
http://www.youtube.com/watch?v=gqwJ-xUPanM
http://news.bbc.co.uk/1/hi/technology/8444358.stm
http://www.thenewecologist.com/2010/01/the-most-exciting-developments-in-green-cell-phones/
http://news.bbc.co.uk/1/hi/technology/8451108.stm
http://news.bbc.co.uk/1/hi/programmes/click_online/8460997.stm
http://www.ted.com/talks/david_pogue_says_simplicity_sells.html
http://www.livescience.com/common/media/video/player.php?aid=33021
http://www.babelgum.com/3021436/good-internet-censorship.htm
coursework
(http://www.ocr.org.uk/qualifications/type/gce/ict_tec/ict/index.aspx) - OCR ICT Website
• http://www.techotopia.com...... Home of free online books IT books
• http://www.ms-access2007.com/tutorials/index.html...... Access tutorials - Beginner level
• http://databases.about.com/od/tutorials/Tutorials.htm... Access tutorials –Intermediate
• www.techonthenet.com.............. Access and Excel skills development – Beginner to Expert level
• http://www.thekjs.essex.sch.uk/yates/candy_floss.htm.......... Excel and Access ( Practice tasks)
• www.exceltips.com............... Microsoft Excel skills.
• http://www.teach-ict.com/videohome.htm....... Microsoft / Adobe tutorial – Beginner to Intermediate
• http://www.mrexcel.com/articles.shtml#Formulas........ Excel Tutorial – Beginner to Expert tasks
• www.teach-ict.net/software/dreamweaver/dreamweaver.htm.... Dreamweaver basic
Subscribe to:
Posts (Atom)